Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of the nist lightweight cryptography finalists and their fault analyses
The security of resource-constrained devices is critical in the IoT field, given that everything
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
is interconnected. Therefore, the National Institute of Standards and Technology (NIST) …
Plundervolt: Software-based fault injection attacks against Intel SGX
Dynamic frequency and voltage scaling features have been introduced to manage ever-
growing heat and power consumption in modern processors. Design restrictions ensure …
growing heat and power consumption in modern processors. Design restrictions ensure …
{CLKSCREW}: Exposing the perils of {Security-Oblivious} energy management
The need for power-and energy-efficient computing has resulted in aggressive cooperative
hardware-software energy management mechanisms on modern commodity devices. Most …
hardware-software energy management mechanisms on modern commodity devices. Most …
SIFA: exploiting ineffective fault inductions on symmetric cryptography
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and
techniques for fault attacks and countermeasures have been studied extensively. The vast …
techniques for fault attacks and countermeasures have been studied extensively. The vast …
[Retracted] A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Z AlJabri, J Abawajy, S Huda - Wireless Communications and …, 2023 - Wiley Online Library
Internet of Things (IoT) is a promising technology for creating smart environments, smart
systems, and smart services. Since security is a fundamental requirement of IoT platforms …
systems, and smart services. Since security is a fundamental requirement of IoT platforms …
Statistical ineffective fault attacks on masked AES with fault countermeasures
Implementation attacks like side-channel and fault attacks are a threat to deployed devices
especially if an attacker has physical access. As a consequence, devices like smart cards …
especially if an attacker has physical access. As a consequence, devices like smart cards …
Fault attacks on CCA-secure lattice KEMs
P Pessl, L Prokop - IACR Transactions on Cryptographic Hardware …, 2021 - incs.ub.rub.de
NIST's post-quantum standardization effort very recently entered its final round. This makes
studying the implementation-security aspect of the remaining candidates an increasingly …
studying the implementation-security aspect of the remaining candidates an increasingly …
Hardware constructions for error detection in lightweight Welch-Gong (WG)-oriented streamcipher WAGE benchmarked on FPGA
Providing an acceptable level of security at low cost becomes a challenge in embedded
systems that have limited resources, eg, Internet of Things application devices. Lightweight …
systems that have limited resources, eg, Internet of Things application devices. Lightweight …
Hardware constructions for lightweight cryptographic block cipher QARMA with error detection mechanisms
The cryptographic algorithm QARMA is a family of lightweight tweakable block ciphers
targeted at applications such as memory encryption and construction of keyed hash …
targeted at applications such as memory encryption and construction of keyed hash …
A statistical fault analysis methodology for the ascon authenticated cipher
Authenticated ciphers are trending in secret key cryptography, since they combine
confidentiality, integrity, and authentication into one algorithm, and offer potential efficiencies …
confidentiality, integrity, and authentication into one algorithm, and offer potential efficiencies …